Добірка наукової літератури з теми "Attack Resilience"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Attack Resilience".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Attack Resilience"
Podobnik, B., D. Horvatic, T. Lipic, M. Perc, J. M. Buldú, and H. E. Stanley. "The cost of attack in competing networks." Journal of The Royal Society Interface 12, no. 112 (November 2015): 20150770. http://dx.doi.org/10.1098/rsif.2015.0770.
Повний текст джерелаЛисенко, Сергій Миколайович, Вячеслав Сергійович Харченко, Кіра Юліївна Бобровнікова та Роман Володимирович Щука. "РЕЗИЛЬЄНТНІСТЬ КОМП’ЮТЕРНИХ СИСТЕМ В УМОВАХ КІБЕРЗАГРОЗ: ТАКСОНОМІЯ ТА ОНТОЛОГІЯ". RADIOELECTRONIC AND COMPUTER SYSTEMS, № 1 (28 січня 2020): 17–28. http://dx.doi.org/10.32620/reks.2020.1.02.
Повний текст джерелаHe, Yao, Yongchun Yang, Meimei Wang, and Xudong Zhang. "Resilience Analysis of Container Port Shipping Network Structure: The Case of China." Sustainability 14, no. 15 (August 2, 2022): 9489. http://dx.doi.org/10.3390/su14159489.
Повний текст джерелаIbrahim, Mariam, and Asma Alkhraibat. "Resiliency Assessment of Microgrid Systems." Applied Sciences 10, no. 5 (March 6, 2020): 1824. http://dx.doi.org/10.3390/app10051824.
Повний текст джерелаLiu, Yuntao, Michael Zuzak, Yang Xie, Abhishek Chakraborty, and Ankur Srivastava. "Robust and Attack Resilient Logic Locking with a High Application-Level Impact." ACM Journal on Emerging Technologies in Computing Systems 17, no. 3 (May 11, 2021): 1–22. http://dx.doi.org/10.1145/3446215.
Повний текст джерелаChen, Mingyu, and Huapu Lu. "Analysis of Transportation Network Vulnerability and Resilience within an Urban Agglomeration: Case Study of the Greater Bay Area, China." Sustainability 12, no. 18 (September 9, 2020): 7410. http://dx.doi.org/10.3390/su12187410.
Повний текст джерелаAfrin, Tanzina, and Nita Yodo. "Resilience-Based Recovery Assessments of Networked Infrastructure Systems under Localized Attacks." Infrastructures 4, no. 1 (March 12, 2019): 11. http://dx.doi.org/10.3390/infrastructures4010011.
Повний текст джерелаYan, Shu, Shao Ting Tang, Sen Pei, Shi Jin Jiang, Wei Hua Li, Xian Teng, and Zhi Ming Zheng. "Resilience to Intentional Attacks of Complex Networks." Applied Mechanics and Materials 421 (September 2013): 647–51. http://dx.doi.org/10.4028/www.scientific.net/amm.421.647.
Повний текст джерелаYeboah-Ofori, Abel, Cameron Swart, Francisca Afua Opoku-Boateng, and Shareeful Islam. "Cyber resilience in supply chain system security using machine learning for threat predictions." Continuity & Resilience Review 4, no. 1 (February 9, 2022): 1–36. http://dx.doi.org/10.1108/crr-10-2021-0034.
Повний текст джерелаMennink, Bart, and Samuel Neves. "On the Resilience of Even-Mansour to Invariant Permutations." Designs, Codes and Cryptography 89, no. 5 (February 23, 2021): 859–93. http://dx.doi.org/10.1007/s10623-021-00850-2.
Повний текст джерелаДисертації з теми "Attack Resilience"
Chen, Ruiliang. "Enhancing Attack Resilience in Cognitive Radio Networks." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/26330.
Повний текст джерелаPh. D.
Klaus, Christian. "Network design for reliability and resilience to attack." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/41406.
Повний текст джерелаWe define and solve two network-design problems. In the first, (1) a defender uses limited resources to select a portfolio of paths or design a sub-network; (2) an attacker then uses limited attack resources to destroy network arcs, and then (3) the defender operates the damaged network optimally by ending a shortest path. The solution identifies a network design that minimizes post-attack path length. We show how the tri-level problem is equivalent to a single-level mixed integer program (MIP) with an exponential number of rows and columns, and solve that MIP using simultaneous row and column generation. Methods extend to network operations denied through general now constructs. The second problem considers a stochastic logistics network where arcs are present randomly and independently. Shipping from a source to a destination may be delayed until a path connecting the two is available. In the presence of storage capacity, cargo can be shipped partway. The problem's solution identifies the storage locations that minimize the cargo's waiting time for shipment. We develop and demonstrate practical methods to solve this #P-complete problem on a model instance derived from a Department of Defense humanitarian shipping network.
Suraev, Maxim. "Denial-of-service attack resilience of the GSM access network." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-13313.
Повний текст джерелаOguz, Saziye Deniz. "Protein Domain Networks: Analysis Of Attack Tolerance Under Varied Circumstances." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12612518/index.pdf.
Повний текст джерелаCraft, LaMesha Lashal. "Perceived Threats to Food Security and Possible Responses Following an Agro-Terrorist Attack." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3289.
Повний текст джерелаBranlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Повний текст джерелаCerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.
Повний текст джерелаSociala manipulationer är bland de vanligaste cyber attackerna och bedrägerierna som orsakar enorma ekonomiska skador varje år för individer, företag och myndigheter. Dessa attacker är svåra att skydda ifrån då sociala manipulationer utnyttjar mänskliga svagheter som ett medel till att stjäla pengar eller information. Målet med studien är att identifiera indikatorer av motstånd mot sociala manipulationsattacker, vilket ska göras med hjälp av individuell data, som kan bestå av nätverksinställningar, sociala medieprofiler, webbaktivitet bland annat. Denna studie är baserat på kvalitativa metoder för att samla, analysera och utvärdera data. Motstånd mot social manipulation utvärderas med hjälp av relevanta teorier och modeller som har med beteende och personligheter att göra, sedan används även personlig och demografisk information i utvärderingen. De indikatorer som identifierades var bland annat inställningar i routrar, webbhistorik och social medianvändning. Det teoretiska ramverket som utvecklades för att utvärdera motstånd mot sociala manipulationsattacker kan utökas med fler aspekter av individuell data. Viktiga samhällshändelser och sammanhang kan vara en intressant faktor som är relaterat till ämnet. Framtida studier skulle kunna kombinera detta ramverk med tekniker som maskinlärning och artificiell intelligens.
Capps, Hannah Patricia. "AFTER THE ATTACK: POLICE PERSPECTIVES ON PROMOTING RESILIENCY FOLLOWING THE 2015 SAN BERNARDINO ATTACK." CSUSB ScholarWorks, 2019. https://scholarworks.lib.csusb.edu/etd/853.
Повний текст джерелаFischer, Benjamin. "Vehicular Group Membership Resilient to Malicious Attacks." Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158086.
Повний текст джерелаJevtić, Ana Ph D. Massachusetts Institute of Technology. "Cyber-attack detection and resilient state estimation in power systems." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/127025.
Повний текст джерелаCataloged from the official PDF of thesis.
Includes bibliographical references (pages 99-108).
Many critical infrastructures, such as transportation and electric energy networks, and health care, are now becoming highly integrated with information and communication technology, in order to be more efficient and reliable. These cyber-physical systems (CPS) now face an increasing threat of cyber-attacks. Intelligent attackers can leverage their knowledge of the system, disruption, and disclosure resources to critically damage the system while remaining undiscovered. In this dissertation, we develop a defense strategy, with the ability to uncover malicious and intelligent attacks and enable resilient operation of cyber-physical systems. Specifically, we apply this defense strategy to power systems, described by linear frequency dynamics around the nominal operating point. Our methodology is based on the notion of data aggregation as a tool for extracting internal information about the system that may be unknown to the attacker. As the first step to resilience and security, we propose several methods for active attack detection in cyber-physical systems. In one approach we design a clustering-based moving-target active detection algorithm and evaluate it against stealthy attacks on the 5-bus and 24-bus power grids. Next, we consider an approach based on Interaction Variables (IntVar), as another intuitive way to extract internal information in power grids. We evaluate the eectiveness of this approach on Automatic Generation Control (AGC), a vital control mechanism in today's power grid. After an attack has been detected, mitigation procedures must be put in place to allow continued reliable operation or graceful degradation of the power grid. To that end, we develop a resilient state estimation algorithm, that provides the system operator with situational awareness in the presence of wide-spread coordinated cyber-attacks when many system measurements may become unavailable.
by Ana Jevtić.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Книги з теми "Attack Resilience"
E, Martin Courtney, ed. Survival and the strength of the human spirit from 9/11 survivors. New York: Dutton, 2011.
Знайти повний текст джерелаUnmeasured strength. New York: Henry Holt and Co., 2011.
Знайти повний текст джерелаBromfield, Richard. Living with the boogeyman: Helping your child cope with fear, terrorism, and living in a world of uncertainty. Roseville, CA: Prima Pub., 2002.
Знайти повний текст джерелаThe resilient homeland: How DHS intelligence should empower America to prepare for, prevent, and withstand terrorist attacks : hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, second session, May 15, 2008. Washington: U.S. G.P.O., 2008.
Знайти повний текст джерелаDepartment of Defense. 2017 Cyber Attack Deterrence: Defense Science Board Task Force on Cyber Deterrence - Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U. S. Nuclear Weapons, Attribution. Independently Published, 2017.
Знайти повний текст джерелаGovernment, U. S., U. S. Military, and Department of Defense. Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service , Resilience Management Model. Independently Published, 2016.
Знайти повний текст джерелаFalco, Gregory J., and Eric Rosenbach. Confronting Cyber Risk. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197526545.001.0001.
Повний текст джерелаZou, Bo, Pooria Choobchian, and Julie Rozenberg. Cyber Resilience of Autonomous Mobility Systems: Cyber Attacks and Resilience-Enhancing Strategies. World Bank, Washington, DC, 2020. http://dx.doi.org/10.1596/1813-9450-9135.
Повний текст джерелаWatson, Daniel, and Henry Campbell. Emotional Intelligence 2. 0: 2 in 1 Social Anxiety Solution and Mental Toughness a Guide to Stop Fear, Stress, Anxiety, Panic Attack, Shyness, Low Self-Esteem. Build Your Resilience and Discover Stoicism. Independently Published, 2020.
Знайти повний текст джерелаDickens, Charles. Bleak House. Edited by Stephen Gill. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199536313.001.0001.
Повний текст джерелаЧастини книг з теми "Attack Resilience"
Ganter, Sarah Anne, and Fernando Oliveira Paulino. "Between Attack and Resilience." In Digital Journalism in Latin America, 106–25. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003370383-7.
Повний текст джерелаIbrahim, Mariam, and Ahmad Alsheikh. "Determining Resiliency Using Attack Graphs." In Recent Developments on Industrial Control Systems Resilience, 117–33. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_6.
Повний текст джерелаShim, Hyungbo, Juhoon Back, Yongsoon Eun, Gyunghoon Park, and Jihan Kim. "Zero-Dynamics Attack, Variations, and Countermeasures." In Security and Resilience of Control Systems, 31–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83236-0_2.
Повний текст джерелаLatif, Mohammad Ayub, Muhammad Naveed, and Faraz Zaidi. "Resilience of Social Networks under Different Attack Strategies." In Lecture Notes in Computer Science, 16–29. Cham: Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03260-3_2.
Повний текст джерелаIbrahim, Mariam, Ahmad Alsheikh, and Qays Al-Hindawi. "Automatic Attack Graph Generation for Industrial Controlled Systems." In Recent Developments on Industrial Control Systems Resilience, 99–116. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_5.
Повний текст джерелаAhmad, H. M. Sabbir, Nader Meskin, and Mohammad Noorizadeh. "Cyber-Attack Detection for a Crude Oil Distillation Column." In Security and Resilience in Cyber-Physical Systems, 323–46. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97166-3_13.
Повний текст джерелаKhajenejad, Mohammad, and Sze Zheng Yong. "Resilient State Estimation and Attack Mitigation in Cyber-Physical Systems." In Security and Resilience in Cyber-Physical Systems, 149–85. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97166-3_7.
Повний текст джерелаRavikumar, Gelli, and Manimaran Govindarasu. "Machine Learning-Based and Physics-Based Attack Resilient Wide-Area Monitoring, Protection and Control Systems." In Security and Resilience of Control Systems, 203–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83236-0_8.
Повний текст джерелаKumar, Abhishek, P. Shanthi Thilagam, Alwyn R. Pais, Vishwas Sharma, and Kunal M. Sadalkar. "Towards Evaluating Resilience of SIP Server under Low Rate DoS Attack." In Information Technology and Mobile Communication, 336–39. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20573-6_58.
Повний текст джерелаPungila, Ciprian, and Viorel Negru. "A Fast Heterogeneous Approach to Enhanced Blockchain Attack Resilience and Mitigation." In 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021), 3–12. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-87872-6_1.
Повний текст джерелаТези доповідей конференцій з теми "Attack Resilience"
Hill, Zachary, William M. Nichols, Mauricio Papa, John C. Hale, and Peter J. Hawrylak. "Verifying attack graphs through simulation." In 2017 Resilience Week (RWS). IEEE, 2017. http://dx.doi.org/10.1109/rweek.2017.8088649.
Повний текст джерелаSoule, Nathaniel, Borislava Simidchieva, Fusun Yaman, Ronald Watro, Joseph Loyall, Michael Atighetchi, Marco Carvalho, David Last, David Myers, and Bridget Flatley. "Quantifying & minimizing attack surfaces containing moving target defenses." In 2015 Resilience Week (RWS). IEEE, 2015. http://dx.doi.org/10.1109/rweek.2015.7287449.
Повний текст джерелаXie, Tian, Ting He, Patrick McDaniel, and Namitha Nambiar. "Attack Resilience of Cache Replacement Policies." In IEEE INFOCOM 2021 - IEEE Conference on Computer Communications. IEEE, 2021. http://dx.doi.org/10.1109/infocom42981.2021.9488697.
Повний текст джерелаAshok, Aditya, Siddharth Sridhar, A. David McKinnon, Pengyuan Wang, and Manimaran Govindarasu. "Testbed-based performance evaluation of Attack Resilient Control for AGC." In 2016 Resilience Week (RWS). IEEE, 2016. http://dx.doi.org/10.1109/rweek.2016.7573319.
Повний текст джерелаGourisetti, Sri Nikhil Gupta, Michael Mylrea, Travis Ashley, Roger Kwon, Jerry Castleberry, Quinn Wright-Mockler, Penny McKenzie, and Geoffrey Brege. "Demonstration of the Cybersecurity Framework through Real-World Cyber Attack." In 2019 Resilience Week (RWS). IEEE, 2019. http://dx.doi.org/10.1109/rws47064.2019.8971822.
Повний текст джерелаFoster, Rita, Zach Priest, and Michael Cutshaw. "Infrastructure eXpression for Codified Cyber Attack Surfaces and Automated Applicability." In 2021 Resilience Week (RWS). IEEE, 2021. http://dx.doi.org/10.1109/rws52686.2021.9611807.
Повний текст джерелаBiswas, Rajorshi, Jie Wu, and Avinash Srinivasan. "Cost-Aware Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack." In 2019 Resilience Week (RWS). IEEE, 2019. http://dx.doi.org/10.1109/rws47064.2019.8972008.
Повний текст джерелаBiswas, Rajorshi, Jie Wu, and Yang Chen. "Optimal Monitor Placement Policy Against Distributed Denial-of-Service Attack in Datacenter." In 2019 Resilience Week (RWS). IEEE, 2019. http://dx.doi.org/10.1109/rws47064.2019.8972010.
Повний текст джерелаFard, Amin Y., Mohammad B. Shadmand, and Sudip K. Mazumder. "Holistic Multi-timescale Attack Resilient Control Framework for Power Electronics Dominated Grid." In 2020 Resilience Week (RWS). IEEE, 2020. http://dx.doi.org/10.1109/rws50334.2020.9241270.
Повний текст джерелаFalco, Gregory. "When Satellites Attack: Satellite-to-Satellite Cyber Attack, Defense and Resilience." In ASCEND 2020. Reston, Virginia: American Institute of Aeronautics and Astronautics, 2020. http://dx.doi.org/10.2514/6.2020-4014.
Повний текст джерелаЗвіти організацій з теми "Attack Resilience"
Nuqui, Reynaldo. Cyber Attack Resilient HVDC System (CARDS) (Final Scientific/Technical Report). Office of Scientific and Technical Information (OSTI), December 2019. http://dx.doi.org/10.2172/1810571.
Повний текст джерелаGasparotto, Thatyanne, and Julia Ambrosano. Opportunities for Sustainable Infrastructure Investments at City Level in Brazil. Inter-American Development Bank, August 2020. http://dx.doi.org/10.18235/0002639.
Повний текст джерелаBelcher, Scott, Terri Belcher, Kathryn Seckman, Brandon Thomas, and Homayun Yaqub. Aligning the Transit Industry and Their Vendors in the Face of Increasing Cyber Risk: Recommendations for Identifying and Addressing Cybersecurity Challenges. Mineta Transportation Institute, July 2022. http://dx.doi.org/10.31979/mti.2022.2113.
Повний текст джерелаIn Hot Water? The Growing Threat of Cyber Attacks to Water Distribution Systems. American Society of Civil Engineers, March 2022. http://dx.doi.org/10.1061/infographic.000003.
Повний текст джерелаEXPERIMENTAL STUDY OF HYSTERETIC BEHAVIOR OF RESILIENT PREFABRICATED STEEL FRAMES WITH AND WITHOUT INTERMEDIATE COLUMNS. The Hong Kong Institute of Steel Construction, September 2022. http://dx.doi.org/10.18057/ijasc.2022.18.3.9.
Повний текст джерела